Security Test: Large JSON input¶
Description¶
Default Severity:
When a system accepts an extremely large JSON input as an argument, it can be tricked into spending too much time or memory processing the data. This is dangerous because attackers could send such huge inputs deliberately, causing the system to slow down, crash, or become unresponsive. Developers often overlook input limits or validations, assuming that inputs will always be well-formed and within reasonable size, making the application vulnerable to denial-of-service attacks. If left unaddressed, the system might suffer from degraded performance or even complete outages, which could lead to service disruptions and further security complications.
Reference:
Configuration¶
Identifier:
resource_limitation/large_json_input
Examples¶
All configuration available:
checks:
resource_limitation/large_json_input:
skip: false # default
options:
skip_objects: # cf. Options below
Options¶
Options can be set in the options
key of the Security Test Configuration.
Property | Type | Default | Description |
---|---|---|---|
skip_objects | List[string] | List of object that are to be skipped by the security test. |
Compliance and Standards¶
Standard | Value |
---|---|
OWASP API Top 10 | API4:2023 |
OWASP LLM Top 10 | LLM04:2023 |
PCI DSS | 6.5.1 |
GDPR | Article-32 |
SOC2 | CC1 |
PSD2 | Article-94 |
ISO 27001 | A.14.2 |
NIST | SP800-95 |
FedRAMP | SI-10 |
CWE | 20 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H/RL:O/RC:C |
CVSS Score | 5.1 |